WordPress.com Servers Had a Low-level (root) Break-in, Matt Mulleweg

Automattic's CEO Matt Mullenweg, today revealed that WordPress.com had a low-level (root) break-in to several of their servers, and potentially anything on those servers could have been revealed."We've been diligently reviewing logs and records about the break-in to determine the extent of the information exposed, and re-securing avenues used to gain access. We presume our […]

Automattic's CEO Matt Mullenweg, today revealed that WordPress.com had a low-level (root) break-in to several of their servers, and potentially anything on those servers could have been revealed.

"We've been diligently reviewing logs and records about the break-in to determine the extent of the information exposed, and re-securing avenues used to gain access. We presume our source code was exposed and copied. While much of our code is Open Source, there're sensitive bits of our and our partners' code. Beyond that, however, it appears information disclosed was limited.

Our investigation into this matter is ongoing and will take time to complete. As I said above, we've taken comprehensive steps to prevent an incident like this from occurring again," informs Mulleweg.

Based on the current revealing, Mulleweg, suggests following security fundamentals:

  • Use a strong password, meaning something random with numbers and punctuation.
  • Use different passwords for different sites.
  • If you've used the same password on different sites, switch it to something more secure.

(Tools like 1Password, LastPass, and KeePass make it easy to keep track of different unique logins.)

[Source: WordPress.com blog]